Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Actualtests security fundamentals mta exam 98 367 test questions. We guarantee it!We make it a reality and give you real mta exam 98 367 questions in our Microsoft mta exam 98 367 braindumps.Latest 100% VALID Microsoft mta exam 98 367 Exam Questions Dumps at below page. You can use our Microsoft mta 98 367 braindumps and pass your exam.
Q71. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a Windows Server 2008 member server that works as a Routing and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for the network. Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS server. Which of the following authentication methods should Mark use to accomplish this task?
A. EAP
B. CHAP
C. SPAP
D. PAP
Answer: A
Q72. Which of the following infects the computer and then hides itself from detection by antivirus software?
A. EICAR virus
B. Boot-sector virus
C. Macro virus
D. Stealth virus
Answer: D
Q73. Which of the following areas of a network contains DNS servers and Web servers for Internet users?
A. VPN
B. MMZ
C. DMZ
D. VLAN
Answer: C
Q74. Which of the following steps can be taken by an administrator as countermeasures against software keyloggers? Each correct answer represents a part of the solution. Choose all that apply.
A. Use commercially available anti-keyloggers.
B. Actively monitor the programs running on the server.
C. Update antivirus regularly.
D. Always check hard disk space on the server.
Answer: ABC
Q75. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do?
A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar.
B. Provide protection against a Distributed Denial of Services attack.
C. Call a team member while behaving to be someone else for gaining access to sensitive information.
D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.
Answer: A
Q76. Which of the following protocols is used to secure workstation and computer authentication across the network?
A. TCP/IP
B. Network Directory Access Protocol
C. Kerberos
D. Lightweight Directory Access Protocol
Answer: C
Q77. Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. ARP poisoning
B. DNS poisoning
C. Mail bombing
D. Keystroke logging
Answer: A
Q78. Which of the following is the result of setting the value of Enforce Password History to 10?
A. The system will remember the last 10 passwords and will not permit the user to reuse any of those passwords.
B. The user is granted with a permission of 10 attempts to validate the password
C. The password can be changed only after 10 days of its creation.
D. The system will automatically generate the new 10 passwords that can be used by the user.
Answer: A
Q79. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply.
A. Encapsulating Security Payload (ESP)
B. Authentication Header (AH)
C. Internet Encryption Key (IEK)
D. Internet Key Exchange (IKE)
Answer: ABD
Q80. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day. Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Which of the following will Mark use to accomplish the task?
A. Implement the principle of least privilege that permits the travel agents for remote access.
B. Implement a Wi-Fi Protected Access that permits the travel agents for remote access.
C. Implement a Wired Equivalent Privacy that permits the travel agents for remote access.
D. Implement a VPN server that permits the travel agents for remote access.
Answer: D